OpenSSO 权利
OpenSSO 的路线图表示,权利将于 2009 年夏天到期。 任何人都知道它是否能够解决数据级别的安全性,例如“用户A只能在屏幕上的该字段中输入<500”或“用户A只能在下拉列表中看到这些值”。
这是如何在组织中实现的,每个应用程序都控制数据级别的安全性,或者是否有一些应用程序拥有其企业存储库。
谢谢
The roadmap for OpenSSO said entitlements would be out summer09. Anyone know whether it will be able to solve data level security, for example "userA can only enter <500 in this field on the screen" OR "UserA can see only these values in the dropdown".
How is this implemented in organisations, each app controls the data level security or is there some who have an enterprise repository for it.
Thanks
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
是的,这正是 OpenSSO 权利旨在解决的问题。 上周我在 JavaOne 上做了一个演示,演示了一个演示手机帐户管理系统,它具有三个策略:
我将在我的博客上发布源代码到演示并解释如何部署它。
要回答问题的第二部分,有一个企业策略存储库,但它是在逐个应用程序的基础上强制执行的。 在演示中,大部分执行是由 servlet 过滤器完成的,该过滤器对每个请求的 URL 进行权利调用。 这很有效,因为我们使用了 RESTful Web 服务来在 URL 中表达所请求的资源。 在一个地方,我们进行了明确的策略调用,因为 URL 模式与策略不对应 - 客户端可以通过电话 URL 导航到帐户资源。 我希望我可以构建另一个策略来处理这个问题,但我实际上想显示一个显式的权利调用。
yes, this is exactly the kind of problem that OpenSSO Entitlements are designed to solve. I did a demo at JavaOne last week that showed a demo mobile phone account management system with three policies:
I'll be posting the source code to the demo and explaining how to deploy it on my blog.
To answer the second part of your question, there is an enterprise repository for policy, but it is enforced on an app-by-app basis. In the demo, most enforcement is done by a servlet filter which makes entitlement calls for each requested URL. This worked well, since we used RESTful web services that express the requested resource in the URL. In one spot we made an explicit policy call since the URL pattern did not correspond to the policy - the client could navigate to the account resource via the phone URL. I expect I could have constructed another policy to handle this, but I actually wanted to show an explicit entitlement call.